In this study, method for experimentally determining the electron density (ne) and the electron temperature (Te) in the atmospheric Argon plasma jet is used; it is based on optical emission spectroscopy (OES). Boltzmann plot method used to calculate these parameters measured for different values of gas flow rate. The results show that the electron temperature decreasing with the increase of gas flow rate also indicates an increasing in the electron density of plasma jet with increasing of gas flow rate.
In this work the effect of annealing temperature on the structure and the electrical properties of Bi thin films was studied, the Bi films were deposited on glass substrates at room temperature by thermal evaporation technique with thickness (0.4 µm) and rate of deposition equal to 6.66Å/sec, all samples are annealed in a vacuum for one hour. The X-ray diffraction analysis shows that the prepared samples are polycrystalline and it exhibits hexagonal structure. The electrical properties of these films were studied with different annealing temperatures, the d.c conductivity for films decreases from 16.42 ? 10-2 at 343K to 10.11?10-2 (?.cm)-1 at 363K. The electrical activation energies Ea1 and Ea2 increase from 0.031 to 0.049eV and
... Show MoreClimate change in recent years has greatly affected the distribution of ground covers. Monitoring these changes has become very easy due to the development of remote sensitivity science and the use of satellites to monitor these changes. The aim of this research is to monitor changes in the spectral reflectivity of the Baghdad governorate center for the month (March, June, September, December) of the year 2021 using remote sensing and satellite images Sentinel 2 and knowing the climate imact on them. Fifty-one samples were selected for four types of ground cover (agricultural land, water, buildings and open space) and their spectral reflectivity was calculated using satellite images.
With growing global demand for hydrocarbons and decreasing conventional reserves, the gas industry is shifting its focus in the direction of unconventional reservoirs. Tight gas reservoirs have typically been deemed uneconomical due to their low permeability which is understood to be below 0.1mD, requiring advanced drilling techniques and stimulation to enhance hydrocarbons. However, the first step in determining the economic viability of the reservoir is to see how much gas is initially in place. Numerical simulation has been regarded across the industry as the most accurate form of gas estimation, however, is extremely costly and time consuming. The aim of this study is to provide a framework for a simple analytical method to esti
... Show MoreThe problem of steady, laminar, natural convective flow in an square enclosure with and without partitions is considered for Rayleigh number (103-106) and Prandtl number (0.7). Vertical walls were maintained isothermal at different temperatures while horizontal walls and the partitions were insulated. The length of partition was taken constant. The number of partitions were placed on horizontal surface in staggered arrangement from (1– 3) and ratio of partition thickness (H/L= 0.033, 0.083, 0.124). The problem is formulated in terms of the vorticity-stream function procedure. A numerical solution based on a program in Fortran 90 with the finite difference method is obtained. Representative results illustrating the effects of the thickn
... Show MoreOne of the most difficult issues in the history of communication technology is the transmission of secure images. On the internet, photos are used and shared by millions of individuals for both private and business reasons. Utilizing encryption methods to change the original image into an unintelligible or scrambled version is one way to achieve safe image transfer over the network. Cryptographic approaches based on chaotic logistic theory provide several new and promising options for developing secure Image encryption methods. The main aim of this paper is to build a secure system for encrypting gray and color images. The proposed system consists of two stages, the first stage is the encryption process, in which the keys are genera
... Show More